/external/openssh/ |
D | kexdhc.c | 54 u_char *kbuf, *hash; in kexdh_client() local 117 kbuf = xmalloc(klen); in kexdh_client() 118 if ((kout = DH_compute_key(kbuf, dh_server_pub, dh)) < 0) in kexdh_client() 121 dump_digest("shared secret", kbuf, kout); in kexdh_client() 125 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) in kexdh_client() 127 memset(kbuf, 0, klen); in kexdh_client() 128 xfree(kbuf); in kexdh_client()
|
D | kexdhs.c | 56 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; in kexdh_server() local 110 kbuf = xmalloc(klen); in kexdh_server() 111 if ((kout = DH_compute_key(kbuf, dh_client_pub, dh)) < 0) in kexdh_server() 114 dump_digest("shared secret", kbuf, kout); in kexdh_server() 118 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) in kexdh_server() 120 memset(kbuf, 0, klen); in kexdh_server() 121 xfree(kbuf); in kexdh_server()
|
D | kexecdhc.c | 58 u_char *kbuf, *hash; in kexecdh_client() local 113 kbuf = xmalloc(klen); in kexecdh_client() 114 if (ECDH_compute_key(kbuf, klen, server_public, in kexecdh_client() 119 dump_digest("shared secret", kbuf, klen); in kexecdh_client() 123 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) in kexecdh_client() 125 memset(kbuf, 0, klen); in kexecdh_client() 126 xfree(kbuf); in kexecdh_client()
|
D | kexecdhs.c | 60 u_char *kbuf, *hash; in kexecdh_server() local 105 kbuf = xmalloc(klen); in kexecdh_server() 106 if (ECDH_compute_key(kbuf, klen, client_public, in kexecdh_server() 111 dump_digest("shared secret", kbuf, klen); in kexecdh_server() 115 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) in kexecdh_server() 117 memset(kbuf, 0, klen); in kexecdh_server() 118 xfree(kbuf); in kexecdh_server()
|
D | kexgexs.c | 59 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; in kexgex_server() local 147 kbuf = xmalloc(klen); in kexgex_server() 148 if ((kout = DH_compute_key(kbuf, dh_client_pub, dh)) < 0) in kexgex_server() 151 dump_digest("shared secret", kbuf, kout); in kexgex_server() 155 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) in kexgex_server() 157 memset(kbuf, 0, klen); in kexgex_server() 158 xfree(kbuf); in kexgex_server()
|
D | kexgexc.c | 55 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; in kexgex_client() local 155 kbuf = xmalloc(klen); in kexgex_client() 156 if ((kout = DH_compute_key(kbuf, dh_server_pub, dh)) < 0) in kexgex_client() 159 dump_digest("shared secret", kbuf, kout); in kexgex_client() 163 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) in kexgex_client() 165 memset(kbuf, 0, klen); in kexgex_client() 166 xfree(kbuf); in kexgex_client()
|
/external/chromium_org/third_party/leveldatabase/src/db/ |
D | leveldb_main.cc | 156 char kbuf[20]; in DumpTable() local 163 snprintf(kbuf, sizeof(kbuf), "%d", static_cast<int>(key.type)); in DumpTable() 164 type = kbuf; in DumpTable()
|
/external/chromium_org/net/third_party/nss/ssl/ |
D | sslcon.c | 1553 PRUint8 * kbuf = 0; /* buffer for RSA decrypted data. */ in ssl2_ServerSetupSessionCypher() local 1631 kbuf = (PRUint8*)PORT_Alloc(modulusLen); in ssl2_ServerSetupSessionCypher() 1632 if (!kbuf) { in ssl2_ServerSetupSessionCypher() 1636 dk = kbuf + modulusLen - dkLen; in ssl2_ServerSetupSessionCypher() 1642 rv = PK11_PubDecryptRaw(sc->SERVERKEY, kbuf, &ddLen, modulusLen, ek, ekLen); in ssl2_ServerSetupSessionCypher() 1651 if ((kbuf[0] != 0x00) || (kbuf[1] != 0x02) || (dk[-1] != 0x00)) { in ssl2_ServerSetupSessionCypher() 1711 PORT_Free(kbuf); in ssl2_ServerSetupSessionCypher()
|